A new keystream generator MUGI D Watanabe, S Furuya, H Yoshida, K Takaragi, B Preneel Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven …, 2002 | 130 | 2002 |
Analysis of a SHA-256 variant H Yoshida, A Biryukov International Workshop on Selected Areas in Cryptography, 245-260, 2005 | 69 | 2005 |
A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW S Hirose, K Ideguchi, H Kuwakado, T Owada, B Preneel, H Yoshida Information Security and Cryptology-ICISC 2010: 13th International …, 2011 | 68 | 2011 |
Grain-128AEADv2-A lightweight AEAD stream cipher M Hell, T Johansson, A Maximov, W Meier, J Sönnerup, H Yoshida NIST Lightweight Cryptography, Finalists, 2021 | 61 | 2021 |
MAME: A compression function with reduced hardware requirements H Yoshida, D Watanabe, K Okeya, J Kitahara, H Wu, Ö Küçük, B Preneel Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International …, 2007 | 46 | 2007 |
An AEAD variant of the grain stream cipher M Hell, T Johansson, W Meier, J Sönnerup, H Yoshida International Conference on Codes, Cryptology, and Information Security, 55-71, 2019 | 26 | 2019 |
An AES based 256-bit hash function for lightweight applications: Lesamnta-LW S Hirose, K Ideguchi, H Kuwakado, T Owada, B Preneel, H Yoshida IEICE transactions on fundamentals of electronics, communications and …, 2012 | 25 | 2012 |
SHA-3 proposal: Lesamnta S Hirose http://csrc. nist. gov/groups/ST/hash/sha-3/Round1/documents/Lesamnta. zip, 2008 | 25 | 2008 |
Update on tiger F Mendel, B Preneel, V Rijmen, H Yoshida, D Watanabe International Conference on Cryptology in India, 63-79, 2006 | 24 | 2006 |
Non-randomness of the full 4 and 5-pass HAVAL H Yoshida, A Biryukov, C De Canniere, J Lano, B Preneel Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005 | 24 | 2005 |
Message-authenticated encryption apparatus or decryption apparatus for common-key cipher H Yoshida, S Furuya US Patent App. 10/786,160, 2004 | 17 | 2004 |
Detailed analysis of security evaluation of automotive systems based on JASO TP15002 Y Kawanishi, H Nishihara, D Souma, H Yoshida Computer Safety, Reliability, and Security: SAFECOMP 2017 Workshops, ASSURE …, 2017 | 14 | 2017 |
A comparative study of JASO TP15002-based security risk assessment methods for connected vehicle system design Y Kawanishi, H Nishihara, D Souma, H Yoshida, Y Hata Security and Communication Networks 2019, 2019 | 13 | 2019 |
A study on RAM requirements of various SHA-3 Candidates on Low-cost 8-bit CPUs K Ideguchi, T Owada, H Yoshida Cryptology ePrint Archive, 2009 | 9 | 2009 |
Pontecorvo reactions in antiproton annihilation at rest in deuterium to , , and M Chiba, T Fujitani, J Iwahori, M Kawaguti, M Kobayashi, S Kurokawa, ... Physical Review D 55 (5), 2577, 1997 | 9 | 1997 |
A new keystream generator MUGI D Watanabe, S Furuya, H Yoshida, K Takaragi, B Preneel IEICE transactions on fundamentals of electronics, communications and …, 2004 | 8 | 2004 |
A mathematical model of rolling load estimation in hot strip mills H Yoshida, K Isobe, Y Hirose, T Naoi, KI Hamada, Y Itoh Journal of the Japan Society for Technology of Plasticity 23 (252), 63-70, 1982 | 8 | 1982 |
On validating attack trees with attack effects H Nishihara, Y Kawanishi, D Souma, H Yoshida International Conference on Computer Safety, Reliability, and Security, 309-324, 2020 | 7 | 2020 |
A study on quantitative risk assessment methods in security design for industrial control systems Y Kawanishi, H Nishihara, D Souma, H Yoshida, Y Hata 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 7 | 2018 |
A pseudorandom-function mode based on Lesamnta-LW and the MDP domain extension and its applications S Hirose, H Kuwakado, H Yoshida IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 7 | 2018 |